[0001] The invention relates to a method and system for verifying authenticity of an object,
more particularly to a method and system for verifying authenticity of an object with
the use of a varying secret key.
[0002] In
U.S. Patent Application Publication No. 20020005774, there is disclosed a conventional system for verifying authenticity of a product.
The conventional system includes a radio frequency identification (RFID) tag that
has an encrypted code and that is associated with the product, and an RFID tag reader
that is operable so as to read the encrypted code of the RFID tag and so as to forward
the encrypted code to an authentication engine for validation.
[0003] The conventional system is disadvantageous in that, since the encrypted code of the
RFID tag is fixed, the conventional system is prone to fraud.
[0004] U.S. Patent Application Publication No. 20050071231 proposes a system that addresses the problem in the aforementioned conventional system.
The proposed system includes a RFID tag, an RFID reader, and an authorizing entity.
The RFID tag is associated with the product. The RFID reader is operable so as to
generate an interrogation signal. The RFID tag, in response to the interrogation signal,
and generates and transmits a random number. The RFID reader is further operable so
as to forward the random number to the authorizing entity for validation.
[0005] Although the proposed system achieves its intended purpose, the authorizing entity
validates the random number from the RFID reader against information stored in a database
thereof. Unauthorized access to the database makes the proposed system prone to fraud.
[0006] Therefore, the object of the present invention is to provide a method and system
for verifying authenticity of an object while ensuring security of transaction.
[0007] According to one aspect of the present invention, a method for verifying authenticity
of an object is to be implemented using a system that includes a radio frequency identification
(RFID) tag associated with the object, an electronic device, and an authenticating
center, and comprises the steps of: enabling the electronic device to generate and
wirelessly transmit a request signal; in response to the request signal, enabling
the RFID tag to generate a first authentication code based on a varying secret key,
a second authentication code based on a unique identification code of the RFID tag
and the varying secret key, and a third authentication code that is based on the unique
identification code of the RFID tag and the first and second authentication codes,
and to wirelessly transmit the third authentication code for reception by the electronic
device; and enabling the electronic device to forward the third authentication code
received from the RFID tag to the authenticating center for verification.
[0008] According to another aspect of the invention, a system for verifying authenticity
of an obj ect comprises a radio frequency identification (RFID) tag, an electronic
device, and an authenticating center. The RFID tag is associated with the object and
has a unique identification code. The electronic device is operable so as to generate
and wirelessly transmit a request signal. The RFID tag, in response to the request
signal, generates a first authentication code based on a varying secret key, a second
authentication code based on a unique identification code of the RFID tag and the
varying secret key, and a third authentication code that is based on the unique identification
code of the RFID tag and the first and second authentication codes, and wirelessly
transmits the third authentication code for reception by the electronic device. The
electronic device forwards the third authentication code received from the RFID tag
to the authenticating center for verification.
[0009] Other features and advantages of the present invention will become apparent in the
following detailed description of the preferred embodiments with reference to the
accompanying drawings, of which:
Figure 1 is a block diagram of the first preferred embodiment of a system for verifying
authenticity of an object according to the present invention;
Figures 2A and 2B are flowcharts of the first preferred embodiment of a method for
verifying authenticity of an object according to the present invention;
Figure 3 is a block diagram of the second preferred embodiment of a system for verifying
authenticity of an object according to the present invention; and
Figures 4A and 4B are flowcharts of the second preferred embodiment of a method for
verifying authenticity of an object according to the present invention.
[0010] Before the present invention is described in greater detail, it should be noted that
like elements are denoted by the same reference numerals throughout the disclosure.
[0011] Referring to Figures 1 and 2, the first preferred embodiment of a system 1 for verifying
authenticity of an object (not shown) according to this invention is shown to include
a radio frequency identification (RFID) tag 5, an electronic device 6, and an authenticating
center 7.
[0012] In this embodiment, the RFID tag 5 is associated with the object and has a unique
identification code.
[0013] The electronic device 6 includes a first processing unit 61 that is operable so as
to generate a request signal, and a first transceiving unit 62 that is coupled to
and that is controlled by the first processing unit 61 of the electronic device 6
to wirelessly transmit the request signal.
[0014] The RFID tag 5, in response to the request signal, generates a varying secret key,
a first authentication code based on the varying secret key, a second authentication
code based on the unique identification code of the RFID tag 5 and the varying secret
key, and a third authentication code that is based on the unique identification code
of the RFID tag 5 and the first and second authentication codes, and wirelessly transmits
the third authentication code for reception by the electronic device 6.
[0015] The first processing unit 61 of the electronic device 6 further controls the first
transceiving unit 62 of the electronic device 6 to forward the third authentication
code received from the RFID tag 5 to the authenticating center 7 for verification.
[0016] The authenticating center 7 includes first and second authenticating devices 71,
72. The first authenticating device 71 of the authenticating center 7 is located at
a service provider (not shown) that administers the system 1 of this invention. The
second authenticating device 72 of the authenticating center 7 is located at a manufacturer
(not shown) of the object.
[0017] The first authenticating device 71 of the authenticating center 7 includes a second
processing unit 711, and a second transceiving unit 712 that is coupled to and that
is controlled by the second processing unit 711 of the first authenticating device
71 to forward the third authentication code received from the electronic device 6
to the second authenticating device 72.
[0018] The second authenticating device 72 of the authenticating center 7 includes a third
processing unit 721, and a third transceiving unit 722. The third processing unit
721 of the second authenticating device 72 executes an algorithm so as to determine
the unique identification code of the RFID tag 5 and the first and second authentication
codes from the third authentication code forwarded by the first authenticating device
71, so as to generate a verifying code that is based on two of the unique identification
code of the RFID tag 5 and the first and second authentication codes, and so as to
compare the verifying code with the remaining one of the unique identification code
of the RFID tag 5 and the first and second authentication codes in order to verify
authenticity of the object. The third transceiving unit 722 of the second authenticating
device 72 is coupled to and is controlled by the third processing unit 721 of the
second authenticating device 72 to forward the comparison result to the first authenticating
device 71.
[0019] The second processing unit 711 of the first authenticating device 71 of the authenticating
center 7 further controls the second transceiving unit 712 of the first authenticating
device 71 to forward the comparison result to the electronic device 6.
[0020] The electronic device 6 further includes an informing unit 63 that is coupled to
and that is controlled by the first processing unit 61 of the electronic device 6
to inform the comparison result forwarded by the first authenticating device 71 of
the authenticating center 7 to a user (not shown). In this embodiment, the informing
unit 63 of the electronic device 6 includes a liquid crystal display (not shown) that
shows the comparison result in the form of a text message or a graphical message or
both. In an alternative embodiment, the informing unit 63 of the electronic device
6 includes a light-emitting diode (not shown) that emits light of different colors,
each of which is indicative of the comparison result. For example, when the light-emitting
diode of the informing unit 63 emits a green light, this indicates that the comparison
result verifies the object as authentic. On the other hand, when the light-emitting
diode of the informing unit 63 emits a red light, this indicates that the comparison
result verifies the object as counterfeit.
[0021] It should be noted herein that informing the comparison result to the user could
be conducted through other means not limited to the informing unit 63. In one embodiment,
the electronic device 6 is operable in a forward mode, where the electronic device
6 forwards the comparison result to a preset email account of the user automatically.
In another embodiment, the electronic device 6 is operable in an upload mode, where
the electronic device 6 uploads the comparison result to an Internet website automatically.
In yet another embodiment, the electronic device 6 is operable in a fax mode, where
the electronic device 6 sends the comparison result to a preset facsimile machine
of the user automatically.
[0022] In this embodiment, the first transceiving unit 62 of the electronic device 6 forwards
the third authentication code to and receives the comparison result from the second
transceiving unit 712 of the first authenticating device 71 of the authenticating
center 7 via a wireless connection 8. Preferably, the wireless connection 8 is one
of an Internet connection, a short message service, a global system for mobile communications
(GSM) connection, a general packet radio service (GPRS) connection, and a wireless
fidelity (Wi-Fi) connection. In an alternative embodiment, the first transceiving
unit 62 of the electronic device 6 forwards the third authentication code to and receives
the comparison result from the second transceiving unit 712 of the first authenticating
device 71 of the authenticating center 7 via a wired connection 8, such as an Ethernet
or bus connection.
[0023] In an alternative embodiment, the authenticating center 7 is dispensed with the second
authenticating device 72. The second processing unit 711 of the first authenticating
device 71 is operable so as to determine the unique identification code of the RFID
tag 5 and the first and second authentication codes from the third authentication
code forwarded by the electronic device 6, so as to generate the verifying code that
is based on two of the unique identification code of the RFID tag 5 and the first
and second authentication codes, and so as to compare the verifying code with the
remaining one of the unique identification code of the RFID tag 5 and the first and
second authentication codes. The second transceiving unit 712 of the first authenticating
device 71 is coupled to and is controlled by the second processing unit 711 of the
first authenticating device 71 to forward the comparison result to the electronic
device 6.
[0024] The first preferred embodiment of a method for verifying authenticity of the object
to be implemented using the aforementioned system 1 includes the steps shown in Figures
2A and 2B.
[0025] In step 31, the first processing unit 61 of the electronic device 6 generates the
request signal, and controls the first transceiving unit 62 of the electronic device
6 to wirelessly transmit the request signal.
[0026] In step 32, in response to the request signal, the RFID tag 5 generates the varying
secret key, the first authentication code based on the varying secret key, the second
authentication code based on the unique identification code of the RFID tag 5 and
the varying secret key, and the third authentication code that is based on the first
and second authentication codes and the unique identification code of the RFID tag
5, and wirelessly transmits the third authentication code.
[0027] It is noted that the varying secret key varies each time that it is generated. In
this embodiment, the varying secret key is a function of date and time. That is, when
the RFID tag 5 receives the request signal from the electronic device 6 on May 17,
2006 at 12:00:30 AM, the RFID tag 5 generates the varying secret key in a format "yyyymmddhhmmss"
to obtain "20060517120030". The RFID tag 5 generates the first authentication code
as a reversed order of digits of the varying secret key to obtain "03002171506002".
Moreover, the RFID tag 5 generates the second authentication code by appending the
varying secret key to the unique identification code (e.g. 123456) of the RFID tag
5 to obtain "12345620060517120030". Further, the RFID tag 5 generates the third authentication
code by stringing together the unique identification code of the RFID tag 5 and the
first and second authentication codes to obtain "1234560300217150600212345620060517120030".
[0028] In step 33, the first transceiving unit 62 of the electronic device 6 receives the
third authentication code transmitted by the RFID tag 5.
[0029] In step 34, the first processing unit 61 of the electronic device 6 controls the
first transceiving unit 62 of the electronic device 6 to forward the third authentication
code received in step 33 to the authenticating center 7 for verification.
[0030] In step 35, the second transceiving unit 712 of the first authenticating device 71
of the authenticating center 7 receives the third authentication code forwarded by
the electronic device 6.
[0031] In step 36, the second processing unit 711 of the first authenticating device 71
controls the second transceiving unit 712 of the first authenticating device 71 to
forward the third authentication code received in step 35 to the second authenticating
device 72 of the authenticating center 7.
[0032] It is noted that the first authenticating device 71 may be used in conjunction with
different second authenticating devices 72 administered by different product manufacturers.
In this case, the unique identification code of the RFID tag 5 should have a first
code portion, e.g., "123", to identify the manufacturer, and a second code portion,
e.g., "456", to identify the manufacturer's product.
[0033] It is also noted that the actual algorithms to generate the inter-related varying
secret key, the first authentication code, the second authentication code, and the
third authentication code may vary among the different product manufactures in accordance
with the requirement of the latter.
[0034] In step 37, the third processing unit 721 of the second authenticating device 72
of the authenticating center 7 determines the unique identification code of the RFID
tag 5 and the first and second authentication codes from the third authentication
code received in step 36, generates the verifying code that is based on two of the
unique identification code of the RFID tag 5 and the first and second authentication
codes, compares the verifying code with the remaining one of the unique identification
code of the RFID tag 5 and the first and second authentication codes in order to verify
the obj ect, and controls the third transceiving unit 722 of the second authenticating
device 72 to forward the comparison result to the first authenticating device 71.
[0035] In this embodiment, the third processing unit 721 of the second authenticating device
72 of the authenticating center 7 generates the verifying code, i.e., "12345620060517120030",
based on the unique identification code of the RFID tag 5, i.e., "123456", and the
first authentication code, i.e., "03002171506002".
[0036] In step 38, the second transceiving unit 712 of the first authenticating device 71
receives the comparison result forwarded by the third transceiving unit 722 of the
second authenticating device 72.
[0037] In step 39, the second processing unit 711 of the first authenticating device 71
controls the second transceiving unit 712 of the first authenticating device 71 of
the authenticating center 7 to forward the comparison result to the electronic device
6.
[0038] In step 40, the first transceiving unit 62 of the electronic device 6 receives the
comparison result forwarded by the second transceiving unit 712 of the first authenticating
device 71 of the authenticating center 7.
[0039] In step 41, the first processing unit 61 of the electronic device 6 controls the
informing unit 63 of the electronic device 6 to inform the comparison result to the
user (not shown).
[0040] Figure 3 illustrates the second preferred embodiment of a system 1' for verifying
authenticity of the object according to this invention. When compared with the previous
embodiment, the first processing unit 61 of the electronic device 6 is further operable
so as to generate an inquiry signal. The first transceiving unit 62 of the electronic
device 6 is further controlled by the first processing unit 61 of the electronic device
6 to transmit the inquiry signal. The system 1' further includes a code-generating
device 9 that includes a fourth processing unit 91 and a fourth transceiving unit
92. The fourth processing unit 91 of the code-generating device 9, in response to
the inquiry signal, generates the varying secret key. The fourth transceiving unit
92 of the code-generating device 9 is coupled to and controlled by the fourth processing
unit 91 of the code-generating device 9 to transmit the varying secret key for reception
by the electronic device 6. In this embodiment, the request signal transmitted by
the electronic device 6 for reception by the RFID tag 5 contains the varying secret
key. In other words, the algorithm for generating the varying secret key is not present
in the RFID tag 5.
[0041] In an alternative embodiment, the authenticating center 7 further includes the code-generating
device 9.
[0042] The second preferred embodiment of a method for verifying authenticity of the object
to be implemented using the aforementioned system 1' according to this invention includes
the steps shown in Figures 4A and 4B.
[0043] In step 51, the first processing unit 61 of the electronic device 6 generates the
inquiry signal, and controls the first transceiving unit 62 of the electronic device
6 to transmit the inquiry signal.
[0044] In step 52, in response to the inquiry signal, the fourth processing unit 91 of the
code-generating device 9 generates and transmits the varying secret key.
[0045] In step 53, the first transceiving unit 62 of the electronic device 6 receives the
varying secret key transmitted by the code-generating device 9.
[0046] In step 54, the first processing unit 61 of the electronic device 6 controls the
first transceiving unit 62 of the electronic device 6 to wirelessly transmit the request
signal that contains the varying secret key.
[0047] In step 55, in response to the request signal, the RFID tag 5 generates the first
authentication code based on the varying secret key, the second authentication code
based on the unique identification code of the RFID tag 5 and the varying secret key,
and the third authentication code that is based on the first and second authentication
codes and the unique identification code of the RFID tag 5, and wirelessly transmits
the third authentication code.
[0048] In step 56, the first transceiving unit 62 of the electronic device 6 receives the
third authentication code transmitted by the RFID tag 5.
[0049] In step 57, the first processing unit 61 of the electronic device 6 controls the
first transceiving unit 62 of the electronic device 6 to forward the third authentication
code received in step 56 to the authenticating center 7 for verification.
[0050] In step 58, the second transceiving unit 712 of the first authenticating device 71
of the authenticating center 7 receives the third authentication code forwarded by
the electronic device 6.
[0051] In step 59, the second processing unit 711 of the first authenticating device 71
controls the second transceiving unit 712 of the first authenticating device 71 to
forward the third authentication code received in step 58 to the second authenticating
device 72 of the authenticating center 7.
[0052] In step 60, the third processing unit 721 of the second authenticating device 72
of the authenticating center 7 determines the unique identification code of the RFID
tag 5 and the first and second authentication codes from the third authentication
code forwarded by the first authenticating device 71, generates the verifying code
that is based on two of the unique identification code of the RFID tag 5 and the first
and second authentication codes, compares the verifying code with the remaining one
of the unique identification code of the RFID tag 5 and the first and second authentication
codes in order to verify the object, and controls the third transceiving unit 722
of the second authenticating device 72 to forward the comparison result to the first
authenticating device 71.
[0053] In step 61, the second transceiving unit 712 of the first authenticating device 71
receives the comparison result forwarded by the third transceiving unit 722 of the
second authenticating device 72.
[0054] In step 62, the second processing unit 711 of the first authenticating device 71
controls the second transceiving unit 712 of the first authenticating device 71 of
the authenticating center 7 to forward the comparison result to the electronic device
6.
[0055] In step 63, the first transceiving unit 62 of the electronic device 6 receives the
comparison result forwarded by the second transceiving unit 712 of the first authenticating
device 71 of the authenticating center 7.
[0056] In step 64, the first processing unit 61 of the electronic device 6 controls the
informing unit 63 of the electronic device 6 to inform the comparison result to the
user (not shown).
[0057] The method and system of this invention can be applied to provide proof of authenticity
of goods sold over the Internet. In such an application, the electronic device 6 is
capable of accessing the Internet and, after receiving the comparison result from
the authenticating center 7, can be operated to upload the comparison result to an
online marketplace (such as a bidding website) such that the comparison result forms
a part of an item description web page for the object that is associated with the
RFID tag and that is being sold by a seller through the online marketplace. Therefore,
interested buyers who access the item description web page can be provided with a
proof of authenticity of the object, i.e., the buyers can rest assured that the object
being sold is authentic.
1. A method for verifying authenticity of an object to be implemented using a system
(1, 1') that includes a radio frequency identification (RFID) tag (5) associated with
the object, an electronic device (6), and an authenticating center (7), said method
comprising the steps of:
(A) enabling the electronic device (6) to generate and wirelessly transmit a request
signal;
(B) in response to the request signal, enabling the RFID tag (5) to generate a first
authentication code based on a varying secret key, a second authentication code based
on a unique identification code of the RFID tag (5) and the varying secret key, and
a third authentication code that is based on the unique identification code of the
RFID tag (5) and the first and second authentication codes, and to wirelessly transmit
the third authentication code for reception by the electronic device (6); and
(C) enabling the electronic device (6) to forward the third authentication code received
from the RFID tag (5) to the authenticating center (7) for verification.
2. The method as claimed in Claim 1, further comprising the step of:
(D) enabling the authenticating center (7) to determine the unique identification
code of the RFID tag (5) and the first and second authentication codes from the third
authentication code forwarded by the electronic device (6), to generate a verifying
code that is based on two of the unique identification code of the RFID tag (5) and
the first and second authentication codes, to compare the verifying code with the
remaining one of the unique identification code of the RFID tag (5) and the first
and second authentication codes in order to verify authenticity of the obj ect, and
to forward a comparison result to the electronic device (6).
3. The method as claimed in Claim 2, further comprising the step of enabling the electronic
device (6) to inform the comparison result to a user.
4. The method as claimed in Claim 3, wherein the electronic device (6) is operable in
at least one of a forward mode, where the electronic device (6) forwards the comparison
result to a preset email account of the user automatically, and an upload mode, where
the electronic device (6) uploads the comparison result to an Internet website automatically.
5. The method as claimed in Claim 1, wherein, in step (B), the varying secret key is
generated by the RFID tag (5).
6. The method as claimed in Claim 1, wherein, in step (A), the request signal contains
the varying secret key.
7. The method as claimed in Claim 1, wherein, in step (C), the electronic device (6)
forwards the third authentication code to the authenticating center (7) via one of
a wireless connection and a wired connection.
8. The method as claimed in Claim 7, wherein said wireless connection is one of an Internet
connection and a short message service, and said wired connection is one of an Ethernet
connection and a bus connection.
9. The method as claimed in Claim 2, wherein, in step (D), the electronic device (6)
receives the comparison result from the authenticating center (7) via one of a wireless
connection and a wired connection.
10. The method as claimed in Claim 9, wherein the wireless connection is one of an Internet
connection and a short message service, and the wired connection is one of an Ethernet
connection and a bus connection.
11. The method as claimed in Claim 2, wherein, in step (D), the authenticating center
(7) includes first and second authenticating devices (71, 72), the first authenticating
device (71) being located at a service provider that administers the system (1, 1'),
the second authenticating device (72) being located at a manufacturer of the object,
the first authenticating device (71) forwarding the third authentication code received
from the electronic device (6) to the second authenticating device (72) for verification.
12. A system (1, 1') for verifying authenticity of an object, comprising:
a radio frequency identification (RFID) tag (5) associated with the object and having
a unique identification code;
an electronic device (6) operable so as to generate and wirelessly transmit a request
signal; and
an authenticating center (7);
wherein, in response to the request signal, said RFID tag (5) generates a first authentication
code based on a varying secret key, a second authentication code based on the unique
identification code of said RFID tag (5) and the varying secret key, and a third authentication
code that is based on the unique identification code of said RFID tag (5) and the
first and second authentication codes, and wirelessly transmits the third authentication
code for reception by said electronic device (6); and
wherein said electronic device (6) forwards the third authentication code received
from said RFID tag (5) to said authenticating center (7) for verification.
13. The system (1, 1') as claimed in Claim 12, wherein said authenticating center (7)
is operable so as to determine the unique identification code of said RFID tag (5)
and the first and second authentication codes from the third authentication code forwarded
by said electronic device (6), so as to generate a verifying code that is based on
two of the unique identification code of said RFID tag (5) and the first and second
authentication codes, so as to compare the verifying code with the remaining one of
the unique identification code of said RFID tag (5) and the first and second authentication
codes in order to verify authenticity of the object, and so as to forward a comparison
result to said electronic device (6).
14. The system (1, 1') as claimed in Claim 12, wherein said RFID tag (5) further generates
the varying secret key in response to the request signal.
15. The system (1, 1') as claimed in Claim 13, wherein said electronic device (6) is further
operable so as to inform the comparison result forwarded by said authenticating center
(7) to a user.
16. The system (1, 1') as claimed in Claim 15, wherein said electronic device (6) is further
operable in a least one of a forward mode, where said electronic device (6) forwards
the comparison result to a preset email account of the user automatically, and an
upload mode, where said electronic device (6) uploads the comparison result to an
Internet website automatically.
17. The system (1, 1') as claimed in Claim 12, wherein the request signal contains the
varying secret key.
18. The system (1') as claimed in Claim 17, wherein said electronic device (6) is further
operable so as to generate and transmit an inquiry signal, said system (1') further
comprising a code-generating device (9) that generates and transmits the varying secret
key to said electronic device (6) in response to the inquiry signal.
19. The system (1, 1') as claimed in Claim 12, wherein said electronic device (6) forwards
the third authentication code to said authenticating center (7) via one of a wireless
connection and a wired connection.
20. The system (1, 1') as claimed in Claim 19, wherein said wireless connection is one
of an Internet connection and a short message service, and said wired connection is
one of an Ethernet connection and a bus connection.
21. The system (1, 1') as claimed in Claim 13, wherein said authenticating center (7)
forwards the comparison result to said electronic device (6) via one of a wireless
connection and a wired connection.
22. The system (1, 1') as claimed in Claim 21, wherein said wireless connection is one
of an Internet connection and a short message service, and said wired connection is
one of an Ethernet connection and a bus connection.
23. The system (1, 1') as claimed in Claim 12, wherein said authenticating center (7)
includes first and second authenticating devices (71, 72), said first authenticating
device (71) being located at a service provider that administers the system (1, 1'),
said second authenticating device (72) being located at a manufacturer of the object,
said first authenticating device (71) forwarding the third authentication code received
from said electronic device (6) to said second authenticating device (72) for verification.